SlideShare a Scribd company logo
1 of 13
Download to read offline
Akula 2.0: Develop, Secure and Govern your
Enterprise Mobile Apps
June 5, 2014
Gregg Bjork, COO
Mark Wagner, Senior Product Marketing Manager
GoToWebinar Housekeeping: Interaction
• Submit your text questions and
comments using the Questions
Panel
• We will answer questions at the
end of the presentation
• This webinar is being recorded and
will be available on verivo.com
shortly
Your Participation
About Verivo Software
3
• Founded in 1999
• Focus on enabling mobility in the enterprise
• Released 2 commercial platforms for building
and deploying apps
Verivo Software
Veterans in the mobile
application industry
Verivo Customers
A track record of mobile
app success with over
500 apps deployed
• Early mobile apps: built apps for Wall Street
• Devices proliferate: delivered AppStudio, a
MEAP to build apps quickly
• Apps proliferate: delivered Akula, an open
platform to develop, secure and govern apps
Verivo Evolution
Increasing velocity as the
mobile market evolves
Mobile Apps - the New Untamed Frontier
4
Mobility: #1 marketing, sales, productivity tool
In everyone’s hands
Access to personal and location data
Fast and convenient
Apps: Cannot secure, manage or govern
IT has no visibility
Security difficult to control
Policy changes hard to enact
Data breaches
Loss of productivity
Compliance violations
Huge
risk
Huge
opportunity
Mobile Technology – State of the Art
5
# Apps
A
P
P
C
O
M
P
L
E
X
I
T
Y
Open Platform
Closed Platforms
Consulting Build
Buy
Many vendors – crowded
market segment
Limited by vendor features
Packaged
applications
Limited
functionality
Build out existing SOA
infrastructure
Ad hoc approach: expensive
to build, expensive to
maintain
Enterprises are migrating up, right
Early adopters in our CAB built
similar infrastructure – validates
approach
Technology Shift: Strategic Approach to Building Apps
6
app
bus. logic
security
data access
data sync
bus. logic
1-OffApproachAkulaInfrastructure
IT control Development teams
Corporate Systems
UI / UX
UI / UX
UI / UX
UI / UX
Corporate Systems
extensible,
open server
security
data access
data sync
bus. logic
develop – secure - govern
hard to update - hard to secure - expensive
app
bus. logic
security
data access
data sync
ent. service
app
UI / UX
security
data access
data sync
bus. logic
app
UI / UX
security
data access
data sync
bus. logic
A More Sophisticated App Lifecycle with Akula
7
Architect
IT / Ops
Mobile App
Development
Teams
Developer Benefits
• Use any IDE, practices
• Only focuses on
UI / UX
• Easy to reuse
existing services
Architect Benefits
• Leverages existing SOA
infrastructure
• Integrates seamlessly with
security architecture
• Can extend with custom
services
Ops Benefits
• Control of, and visibility into
mobile services
• Apps security is centralized
• Updates: update service
once, not apps
Verivo Akula: Extend SOA to Mobile
8
Corporate Systems
SOA
Accommodate for…
• Small, low-bandwidth devices
• Mobile security
• Unreliable connectivity
• Multiple mobile platforms (BYOD)
…by providing services for
• Security and governance policies
• Data access
• Data sync
• SOAP  REST
• Authentication
• Entitlements
• Off-line availability
• App management
• Monitoring
• Tracking
• Extensible – add services as needed
develop - secure - govern
Verivo Akula – Enterprise Mobile App Platform
JDBC
<CUSTOM>
REST
SOAP
CUSTOM
LOGIC
JOIN
FILTER
SELECT
TRANSFORM
CREDENTIAL STORAGE
ENTITLEMENTS
APP PROPERTIES / POLICY
AUTHENTICATION
JMX
DEPLOYMENT SERVICES
GEOSERVICESNOTIFICATIONS
DATA SYNC AND OFFLINE
STORE API LOCAL
STORE
CONTENT STORE
SECURITY POLICY
APP PROPERTIES
AUTHENTICATION/LOGIN
(offline login)
DATA MODEL ENTITIES
MANAGEMENT
CONSOLE SNMP
JMX
AD – LDAP -
JDBC - <CUSTUM>
DATABASE MEDIA SOCIAL
MAPPING CMS SAP
SALESFORCE REST <CUSTOM>
SYSTEM
ADMINISTRATION
PLATFORMS
SCOM TIVOLI
ENTERPRISE SECURITY & POLICY
MANAGEMENT
& CONTROL APIs
MOBILE APP SERVICES
UNICENTER
Akula 2.0: Giving IT more Control, Visibility, and Governance
Client Actions
What: Akula service can push an action (data wipe, update
permissions, app properties etc.) asynchronously to any client
device and monitor execution
Why: Gives IT granular control over apps running on devices;
Unique to Verivo Akula
Push Notifications
What: unified API for sending alerts, badges, and sounds to
individual users, groups, or roles
Why: Allows direct communication with users
Management Console
What: Web-based GUI console for full management of Akula apps
(authorization, client actions, push notifications, client login and
sync rules, security and governance policies )
Why: simplifies app control, visibility and governance
10
11
 CRM app – secure connection
 Works off-line
 Full management and control
The Akula Edge
12
1. Eliminate data breaches – Security for mobile apps
2. Increase velocity - Reuse mobile service
3. Ensure compliance – Centralized governance
4. Complete visibility – tracking from IT to device
5. Extensible – no limits
13
eMail: sales@verivo.com
Call: 781-795-8200
Follow us on Twitter: @VerivoSoftware &
LinkedIn: http://www.linkedin.com/company/verivo
Ready to get started?
Engage with us today.
Ready to evaluate?
No-cost eval with support
Work with Verivo Akula experts to make sure
your proof-of-concept is a success

More Related Content

What's hot

Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile EnterpriseIBM Danmark
 
Key Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility SolutionKey Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility Solutionroshanjk
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overviewDavid Scruggs
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case studySymplified
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture StrategyGary Wong
 
Side Channel Leaks in Mobile Applications
Side Channel Leaks in Mobile ApplicationsSide Channel Leaks in Mobile Applications
Side Channel Leaks in Mobile ApplicationsIoannis Stais
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeSamsung Biz Mobile
 
SOTI MobiControl
SOTI MobiControlSOTI MobiControl
SOTI MobiControlMobileWorxs
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. Samsung Biz Mobile
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0WSO2
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 

What's hot (20)

Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 
Key Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility SolutionKey Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility Solution
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overview
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case study
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture Strategy
 
Side Channel Leaks in Mobile Applications
Side Channel Leaks in Mobile ApplicationsSide Channel Leaks in Mobile Applications
Side Channel Leaks in Mobile Applications
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
SOTI MobiControl
SOTI MobiControlSOTI MobiControl
SOTI MobiControl
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business.
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
Knox Customization Sales Deck
Knox Customization Sales DeckKnox Customization Sales Deck
Knox Customization Sales Deck
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 

Viewers also liked

How to create a viral #GivingTuesday campaign
How to create a viral #GivingTuesday campaignHow to create a viral #GivingTuesday campaign
How to create a viral #GivingTuesday campaignUniVoIP
 
Is Asia Really Rising
Is Asia Really RisingIs Asia Really Rising
Is Asia Really RisingLisa M. Beck
 
секрети успіху
секрети успіхусекрети успіху
секрети успіхуNataljaGolik
 
Legislation changes to improve bc ev charging infrastructure
Legislation changes to improve bc ev charging infrastructureLegislation changes to improve bc ev charging infrastructure
Legislation changes to improve bc ev charging infrastructureGordon James
 
Blood Is Thinner Than Market Research.PDF
Blood Is Thinner Than Market Research.PDFBlood Is Thinner Than Market Research.PDF
Blood Is Thinner Than Market Research.PDFLisa M. Beck
 
Toronto Recreation Infographic
Toronto Recreation InfographicToronto Recreation Infographic
Toronto Recreation InfographicREC Media
 
Narrative theory
Narrative theoryNarrative theory
Narrative theory09evansash
 
CMY's Portfolio-Graphic
CMY's Portfolio-GraphicCMY's Portfolio-Graphic
CMY's Portfolio-GraphicMinyan Chen
 
Pitkäjänteinen ja elinkeinoa huomioiva alkoholipolitiikka
Pitkäjänteinen ja elinkeinoa huomioiva alkoholipolitiikkaPitkäjänteinen ja elinkeinoa huomioiva alkoholipolitiikka
Pitkäjänteinen ja elinkeinoa huomioiva alkoholipolitiikkaSAJKRY
 
PERANAN PEMBELAJARAN SOSIOLOGI PADA LEMBAGA BIMBINGAN BELAJAR NEUTRON YOGYAKA...
PERANAN PEMBELAJARAN SOSIOLOGI PADA LEMBAGA BIMBINGAN BELAJAR NEUTRON YOGYAKA...PERANAN PEMBELAJARAN SOSIOLOGI PADA LEMBAGA BIMBINGAN BELAJAR NEUTRON YOGYAKA...
PERANAN PEMBELAJARAN SOSIOLOGI PADA LEMBAGA BIMBINGAN BELAJAR NEUTRON YOGYAKA...norafifah05
 
Week 2 Exploration: Storyboard
Week 2 Exploration: StoryboardWeek 2 Exploration: Storyboard
Week 2 Exploration: Storyboardsamatesig
 

Viewers also liked (20)

How to create a viral #GivingTuesday campaign
How to create a viral #GivingTuesday campaignHow to create a viral #GivingTuesday campaign
How to create a viral #GivingTuesday campaign
 
Is Asia Really Rising
Is Asia Really RisingIs Asia Really Rising
Is Asia Really Rising
 
UNISANJ
UNISANJUNISANJ
UNISANJ
 
Open House
Open HouseOpen House
Open House
 
Web marketing 201
Web marketing 201Web marketing 201
Web marketing 201
 
Resume-Mohmmad Mahmood
Resume-Mohmmad MahmoodResume-Mohmmad Mahmood
Resume-Mohmmad Mahmood
 
секрети успіху
секрети успіхусекрети успіху
секрети успіху
 
Simple past
Simple pastSimple past
Simple past
 
Legislation changes to improve bc ev charging infrastructure
Legislation changes to improve bc ev charging infrastructureLegislation changes to improve bc ev charging infrastructure
Legislation changes to improve bc ev charging infrastructure
 
Blood Is Thinner Than Market Research.PDF
Blood Is Thinner Than Market Research.PDFBlood Is Thinner Than Market Research.PDF
Blood Is Thinner Than Market Research.PDF
 
Gipuzkoa
GipuzkoaGipuzkoa
Gipuzkoa
 
Toronto Recreation Infographic
Toronto Recreation InfographicToronto Recreation Infographic
Toronto Recreation Infographic
 
Narrative theory
Narrative theoryNarrative theory
Narrative theory
 
CMY's Portfolio-Graphic
CMY's Portfolio-GraphicCMY's Portfolio-Graphic
CMY's Portfolio-Graphic
 
Pitkäjänteinen ja elinkeinoa huomioiva alkoholipolitiikka
Pitkäjänteinen ja elinkeinoa huomioiva alkoholipolitiikkaPitkäjänteinen ja elinkeinoa huomioiva alkoholipolitiikka
Pitkäjänteinen ja elinkeinoa huomioiva alkoholipolitiikka
 
PERANAN PEMBELAJARAN SOSIOLOGI PADA LEMBAGA BIMBINGAN BELAJAR NEUTRON YOGYAKA...
PERANAN PEMBELAJARAN SOSIOLOGI PADA LEMBAGA BIMBINGAN BELAJAR NEUTRON YOGYAKA...PERANAN PEMBELAJARAN SOSIOLOGI PADA LEMBAGA BIMBINGAN BELAJAR NEUTRON YOGYAKA...
PERANAN PEMBELAJARAN SOSIOLOGI PADA LEMBAGA BIMBINGAN BELAJAR NEUTRON YOGYAKA...
 
When it Pays to Sweat the Small Stuff
When it Pays to Sweat the Small StuffWhen it Pays to Sweat the Small Stuff
When it Pays to Sweat the Small Stuff
 
Week 2 Exploration: Storyboard
Week 2 Exploration: StoryboardWeek 2 Exploration: Storyboard
Week 2 Exploration: Storyboard
 
Php curl
Php curlPhp curl
Php curl
 
Evaluatin - q2
Evaluatin - q2Evaluatin - q2
Evaluatin - q2
 

Similar to Verivo Akula 2.0 - Development, Security and Governance of Enterprise Mobile Apps

DevBeat 2013 IBM Master Class presentation
DevBeat 2013 IBM Master Class presentationDevBeat 2013 IBM Master Class presentation
DevBeat 2013 IBM Master Class presentationLeigh Williamson
 
Kony Mobility Platform
Kony Mobility PlatformKony Mobility Platform
Kony Mobility PlatformVeeresh Nirni
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataAppear
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsCA API Management
 
Gathering App Intelligence for your Web, Desktop and Mobile apps
Gathering App Intelligence for your Web, Desktop and Mobile appsGathering App Intelligence for your Web, Desktop and Mobile apps
Gathering App Intelligence for your Web, Desktop and Mobile appsAbhishek Kant
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Ibm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mcIbm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mcSaranga Tripathy
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresSBWebinars
 
Product Sheet - BeAnywhere InSight
Product Sheet - BeAnywhere InSightProduct Sheet - BeAnywhere InSight
Product Sheet - BeAnywhere InSightBeAnywhere
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Convertigo Mobility Platform | Mobile Application Development for Enterprises...
Convertigo Mobility Platform | Mobile Application Development for Enterprises...Convertigo Mobility Platform | Mobile Application Development for Enterprises...
Convertigo Mobility Platform | Mobile Application Development for Enterprises...Convertigo | MADP & MBaaS
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
Splunk MINT Deepdive
Splunk MINT DeepdiveSplunk MINT Deepdive
Splunk MINT DeepdiveSplunk
 
Splunk MINT Deepdive
Splunk MINT DeepdiveSplunk MINT Deepdive
Splunk MINT DeepdiveSplunk
 
Splunk MINT Deepdive
Splunk MINT Deepdive Splunk MINT Deepdive
Splunk MINT Deepdive Splunk
 
Splunk MINT Deepdive
Splunk MINT DeepdiveSplunk MINT Deepdive
Splunk MINT DeepdiveSplunk
 

Similar to Verivo Akula 2.0 - Development, Security and Governance of Enterprise Mobile Apps (20)

DevBeat 2013 IBM Master Class presentation
DevBeat 2013 IBM Master Class presentationDevBeat 2013 IBM Master Class presentation
DevBeat 2013 IBM Master Class presentation
 
Kony Mobility Platform
Kony Mobility PlatformKony Mobility Platform
Kony Mobility Platform
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
 
行動應用App管理 (MAM)
行動應用App管理 (MAM) 行動應用App管理 (MAM)
行動應用App管理 (MAM)
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
 
Gathering App Intelligence for your Web, Desktop and Mobile apps
Gathering App Intelligence for your Web, Desktop and Mobile appsGathering App Intelligence for your Web, Desktop and Mobile apps
Gathering App Intelligence for your Web, Desktop and Mobile apps
 
Ubiquity_Commercial.pptx
Ubiquity_Commercial.pptxUbiquity_Commercial.pptx
Ubiquity_Commercial.pptx
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Ibm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mcIbm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mc
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
Product Sheet - BeAnywhere InSight
Product Sheet - BeAnywhere InSightProduct Sheet - BeAnywhere InSight
Product Sheet - BeAnywhere InSight
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Convertigo Mobility Platform | Mobile Application Development for Enterprises...
Convertigo Mobility Platform | Mobile Application Development for Enterprises...Convertigo Mobility Platform | Mobile Application Development for Enterprises...
Convertigo Mobility Platform | Mobile Application Development for Enterprises...
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
Splunk MINT Deepdive
Splunk MINT DeepdiveSplunk MINT Deepdive
Splunk MINT Deepdive
 
Splunk MINT Deepdive
Splunk MINT DeepdiveSplunk MINT Deepdive
Splunk MINT Deepdive
 
Splunk MINT Deepdive
Splunk MINT Deepdive Splunk MINT Deepdive
Splunk MINT Deepdive
 
Splunk MINT Deepdive
Splunk MINT DeepdiveSplunk MINT Deepdive
Splunk MINT Deepdive
 

Recently uploaded

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 

Recently uploaded (20)

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 

Verivo Akula 2.0 - Development, Security and Governance of Enterprise Mobile Apps

  • 1. Akula 2.0: Develop, Secure and Govern your Enterprise Mobile Apps June 5, 2014 Gregg Bjork, COO Mark Wagner, Senior Product Marketing Manager
  • 2. GoToWebinar Housekeeping: Interaction • Submit your text questions and comments using the Questions Panel • We will answer questions at the end of the presentation • This webinar is being recorded and will be available on verivo.com shortly Your Participation
  • 3. About Verivo Software 3 • Founded in 1999 • Focus on enabling mobility in the enterprise • Released 2 commercial platforms for building and deploying apps Verivo Software Veterans in the mobile application industry Verivo Customers A track record of mobile app success with over 500 apps deployed • Early mobile apps: built apps for Wall Street • Devices proliferate: delivered AppStudio, a MEAP to build apps quickly • Apps proliferate: delivered Akula, an open platform to develop, secure and govern apps Verivo Evolution Increasing velocity as the mobile market evolves
  • 4. Mobile Apps - the New Untamed Frontier 4 Mobility: #1 marketing, sales, productivity tool In everyone’s hands Access to personal and location data Fast and convenient Apps: Cannot secure, manage or govern IT has no visibility Security difficult to control Policy changes hard to enact Data breaches Loss of productivity Compliance violations Huge risk Huge opportunity
  • 5. Mobile Technology – State of the Art 5 # Apps A P P C O M P L E X I T Y Open Platform Closed Platforms Consulting Build Buy Many vendors – crowded market segment Limited by vendor features Packaged applications Limited functionality Build out existing SOA infrastructure Ad hoc approach: expensive to build, expensive to maintain Enterprises are migrating up, right Early adopters in our CAB built similar infrastructure – validates approach
  • 6. Technology Shift: Strategic Approach to Building Apps 6 app bus. logic security data access data sync bus. logic 1-OffApproachAkulaInfrastructure IT control Development teams Corporate Systems UI / UX UI / UX UI / UX UI / UX Corporate Systems extensible, open server security data access data sync bus. logic develop – secure - govern hard to update - hard to secure - expensive app bus. logic security data access data sync ent. service app UI / UX security data access data sync bus. logic app UI / UX security data access data sync bus. logic
  • 7. A More Sophisticated App Lifecycle with Akula 7 Architect IT / Ops Mobile App Development Teams Developer Benefits • Use any IDE, practices • Only focuses on UI / UX • Easy to reuse existing services Architect Benefits • Leverages existing SOA infrastructure • Integrates seamlessly with security architecture • Can extend with custom services Ops Benefits • Control of, and visibility into mobile services • Apps security is centralized • Updates: update service once, not apps
  • 8. Verivo Akula: Extend SOA to Mobile 8 Corporate Systems SOA Accommodate for… • Small, low-bandwidth devices • Mobile security • Unreliable connectivity • Multiple mobile platforms (BYOD) …by providing services for • Security and governance policies • Data access • Data sync • SOAP  REST • Authentication • Entitlements • Off-line availability • App management • Monitoring • Tracking • Extensible – add services as needed develop - secure - govern
  • 9. Verivo Akula – Enterprise Mobile App Platform JDBC <CUSTOM> REST SOAP CUSTOM LOGIC JOIN FILTER SELECT TRANSFORM CREDENTIAL STORAGE ENTITLEMENTS APP PROPERTIES / POLICY AUTHENTICATION JMX DEPLOYMENT SERVICES GEOSERVICESNOTIFICATIONS DATA SYNC AND OFFLINE STORE API LOCAL STORE CONTENT STORE SECURITY POLICY APP PROPERTIES AUTHENTICATION/LOGIN (offline login) DATA MODEL ENTITIES MANAGEMENT CONSOLE SNMP JMX AD – LDAP - JDBC - <CUSTUM> DATABASE MEDIA SOCIAL MAPPING CMS SAP SALESFORCE REST <CUSTOM> SYSTEM ADMINISTRATION PLATFORMS SCOM TIVOLI ENTERPRISE SECURITY & POLICY MANAGEMENT & CONTROL APIs MOBILE APP SERVICES UNICENTER
  • 10. Akula 2.0: Giving IT more Control, Visibility, and Governance Client Actions What: Akula service can push an action (data wipe, update permissions, app properties etc.) asynchronously to any client device and monitor execution Why: Gives IT granular control over apps running on devices; Unique to Verivo Akula Push Notifications What: unified API for sending alerts, badges, and sounds to individual users, groups, or roles Why: Allows direct communication with users Management Console What: Web-based GUI console for full management of Akula apps (authorization, client actions, push notifications, client login and sync rules, security and governance policies ) Why: simplifies app control, visibility and governance 10
  • 11. 11  CRM app – secure connection  Works off-line  Full management and control
  • 12. The Akula Edge 12 1. Eliminate data breaches – Security for mobile apps 2. Increase velocity - Reuse mobile service 3. Ensure compliance – Centralized governance 4. Complete visibility – tracking from IT to device 5. Extensible – no limits
  • 13. 13 eMail: sales@verivo.com Call: 781-795-8200 Follow us on Twitter: @VerivoSoftware & LinkedIn: http://www.linkedin.com/company/verivo Ready to get started? Engage with us today. Ready to evaluate? No-cost eval with support Work with Verivo Akula experts to make sure your proof-of-concept is a success